National Cyber Warfare Foundation (NCWF) Forums


Analysis of an Interesting Malicious HTA File


0 user ratings
2021-01-01 15:45:02
milo
Digital Forensics / Incident Response (DFIR)
In this article, we analyze a malicious hta file that we found on VirusTotal. This instance uses a few interesting techniques to evade existing detection mechanisms. In this blog post, we provide an in-depth analysis of this instance and reveal the techniques that are utilized to keep the instance under the radar. At the time of hunting this instance, only two engines marked this instance as malicious.

Analysis of an Interesting Malicious HTA File
https://inquest.net/Interesting-Analysis-of-a-Malicious-HTA-File
In this article, we analyze a malicious hta file that we found on VirusTotal. This instance uses a few interesting techniques to evade existing detection mechanisms. In this blog post, we provide an in-depth analysis of this instance and reveal the techniques that are utilized to keep the instance under the radar. At the time of hunting this instance, only two engines marked this instance as malicious.
2019-04-30
Amir Niakanlahiji
https://inquest.net/Interesting-Analysis-of-a-Malicious-HTA-File

Source: Inquest
Source Link: https://inquest.net/Interesting-Analysis-of-a-Malicious-HTA-File


Comments
new comment
Nobody has commented yet. Will you be the first?
 
return to home



Copyright 2012 through 2021 - National Cyber Warfare Foundation - All rights reserved worldwide.